Solaris 11 X86 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000181
<GroupDescription></GroupDescription>Group -
The operating system must prevent the execution of prohibited mobile code.
<VulnDiscussion>Decisions regarding the employment of mobile code within operating systems are based on the potential for the code to cause d...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must employ PKI solutions at workstations, servers, or mobile computing devices on the network to create, manage, distribute, use, store, and revoke digital certificates.
<VulnDiscussion>Without the use of PKI systems to manage digital certificates, the operating system or other system components may be unable ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.
<VulnDiscussion>In order to minimize potential negative impact to the organization caused by malicious code, it is imperative that malicious ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must have malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means.
<VulnDiscussion>This requirement applies to email servers only. In order to minimize potential negative impact to the organization caused b...Rule Medium Severity -
SRG-OS-000215
<GroupDescription></GroupDescription>Group -
The operating system must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
<VulnDiscussion>Protection of log data includes assuring log data is not accidentally lost or deleted. Backing up audit records to a differen...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
All manual editing of system-relevant files shall be done using the pfedit command, which logs changes made to the files.
<VulnDiscussion>Editing a system file with common tools such as vi, emacs, or gedit does not allow the auditing of changes made by an operato...Rule Low Severity -
SRG-OS-000142
<GroupDescription></GroupDescription>Group -
The operating system must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial of service attacks.
<VulnDiscussion>In the case of denial of service attacks, care must be taken when designing the operating system so as to ensure that the ope...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The /etc/zones directory, and its contents, must have the vendor default owner, group, and permissions.
<VulnDiscussion>Incorrect ownership can result in unauthorized changes or theft of data.</VulnDiscussion><FalsePositives></Fal...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The limitpriv zone option must be set to the vendor default or less permissive.
<VulnDiscussion>Solaris zones can be assigned privileges generally reserved for the global zone using the "limitpriv" zone option. Any privil...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The systems physical devices must not be assigned to non-global zones.
<VulnDiscussion>Solaris non-global zones can be assigned physical hardware devices. This increases the risk of such a non-global zone having ...Rule Medium Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The audit system must identify in which zone an event occurred.
<VulnDiscussion>Tracking the specific Solaris zones in the audit trail reduces the time required to determine the cause of a security event.&...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The audit system must maintain a central audit trail for all zones.
<VulnDiscussion>Centralized auditing simplifies the investigative process to determine the cause of a security event.</VulnDiscussion>&...Rule Low Severity -
SRG-OS-000480
<GroupDescription></GroupDescription>Group -
The operating system must monitor for unauthorized connections of mobile devices to organizational information systems.
<VulnDiscussion>Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk drives) and portable computing and...Rule Medium Severity -
SRG-OS-000349
<GroupDescription></GroupDescription>Group -
The audit system must support an audit reduction capability.
<VulnDiscussion>Using the audit system will utilize the audit reduction capability. Without an audit reduction capability, users find it diff...Rule Medium Severity -
SRG-OS-000352
<GroupDescription></GroupDescription>Group -
The audit system records must be able to be used by a report generation capability.
<VulnDiscussion>Enabling the audit system will produce records for use in report generation. Without an audit reporting capability, users fi...Rule Medium Severity -
SRG-OS-000062
<GroupDescription></GroupDescription>Group -
The operating system must support the capability to compile audit records from multiple components within the system into a system-wide (logical or physical) audit trail that is time-correlated to within organization-defined level of tolerance.
<VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...Rule Medium Severity -
SRG-OS-000062
<GroupDescription></GroupDescription>Group -
The audit system must be configured to audit all discretionary access control permission modifications.
<VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...Rule Medium Severity -
SRG-OS-000062
<GroupDescription></GroupDescription>Group -
The audit system must be configured to audit the loading and unloading of dynamic kernel modules.
<VulnDiscussion>Without auditing, individual system accesses cannot be tracked, and malicious activity cannot be detected and traced back to ...Rule Medium Severity -
SRG-OS-000343
<GroupDescription></GroupDescription>Group -
The audit system must alert the SA when the audit storage volume approaches its capacity.
<VulnDiscussion>Filling the audit storage area can result in a denial of service or system outage and can lead to events going undetected.<...Rule Medium Severity -
SRG-OS-000344
<GroupDescription></GroupDescription>Group -
The audit system must alert the System Administrator (SA) if there is any type of audit failure.
<VulnDiscussion>Proper alerts to system administrators and Information Assurance (IA) officials of audit failures ensure a timely response to...Rule High Severity -
SRG-OS-000341
<GroupDescription></GroupDescription>Group -
The operating system must allocate audit record storage capacity.
<VulnDiscussion>Proper audit storage capacity is crucial to ensuring the ongoing logging of critical events.</VulnDiscussion><FalseP...Rule Medium Severity -
SRG-OS-000341
<GroupDescription></GroupDescription>Group -
The operating system must configure auditing to reduce the likelihood of storage capacity being exceeded.
<VulnDiscussion>Overflowing the audit storage area can result in a denial of service or system outage.</VulnDiscussion><FalsePositiv...Rule High Severity -
SRG-OS-000366
<GroupDescription></GroupDescription>Group -
The system must verify that package updates are digitally signed.
<VulnDiscussion>Digitally signed packages ensure that the source of the package can be identified.</VulnDiscussion><FalsePositives&g...Rule Medium Severity -
SRG-OS-000363
<GroupDescription></GroupDescription>Group -
The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.
<VulnDiscussion>Addition of unauthorized code or packages may result in data corruption or theft.</VulnDiscussion><FalsePositives>...Rule Medium Severity -
SRG-OS-000368
<GroupDescription></GroupDescription>Group -
The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications.
<VulnDiscussion>Operating systems are capable of providing a wide variety of functions and services. Execution must be disabled based on orga...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.